skip to main content
article

24-hour knowledge factory: Using Internet technology to leverage spatial and temporal separations

Published:01 August 2007Publication History
Skip Abstract Section

Abstract

Several of the outsourcing endeavors of today will gradually converge to a hybrid outsourcing model that will involve a team spread across three or more strategically-located centers interconnected by Internet technology. White-collar professionals in the US, Australia, and Poland, for example, could each work on a standard 9--5 basis, transfer the activity to a colleague in the next center, thereby enabling work to be performed on a round-the-clock basis. The effective use of sequential workers in such a 24-hour knowledge factory requires that professional tasks be broken down to the level where individuals can work on them with minimal interaction with their peers, and where new approaches can be employed to reduce the effort involved in transitioning from one employee to the next. This article describes an Internet-based prototype system that uses a Web-based interactive approach, coupled with a unique data model, to optimize collection and storage of design rationale and history from stakeholders and workers. The idea of multiple individuals acting as one “composite persona” is explored in the context of facilitating tasks and knowledge to be shared across the Internet in a seamless manner. The article also describes related activities in the commercial arena.

References

  1. Aron, R. and Singh, J. 2004. IT enabled strategic outsourcing: Knowledge intensive firms, information work and the extended organizational form. Tech. Rep., The Wharton School, University of Pennsylvania.Google ScholarGoogle Scholar
  2. Bartmess, A. and Cerny, K. Winter 1993. Building competitive advantage through a global network of competencies. CA. Manag. Rev. 78--103.Google ScholarGoogle Scholar
  3. Battin, R. D., Crocker, R., Kreidler, J., and Subramanian, K. 2001. Leveraging resources in global software development. IEEE Software. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Beck, K. 2000. Extreme Programming Explained: Embrace Change. Addison Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Berger, S. 2005. How We Compete. DoubleDay.Google ScholarGoogle Scholar
  6. Blaxill, M. and Hout, T. 1991. The fallacy of the overhead quick fix. Harv. Bus. Rev., 93--101.Google ScholarGoogle Scholar
  7. Bohanec, M. and Zupan, B. 2004. A function-decomposition method for development of hierarchical decision models. Decis. Sup. Syst. 36, 3, 215--233. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Boneh, D., Ding, X., and Tsudik, G. 2004. Fine-grained control of security capabilities. ACM Trans. Inter. Tech. 4, 1, 60--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Brice, A. and Johns, B. 1998. Improving process design by improving the design process. A DRAMA White Paper. QuantiSci.Google ScholarGoogle Scholar
  10. Carmel, E. and Agarwal, R. 2002. The maturation of offshore sourcing of information technology work. MIS Quart. Exec.Google ScholarGoogle Scholar
  11. Cederqvist, P. et al. 2005. Version Management with CVS for CVS 1.12.12. Free Software Foundation, Inc.Google ScholarGoogle Scholar
  12. Champy, J. 2003. Is technology delivering on its productivity promise? Finan. Exec., 34--39.Google ScholarGoogle Scholar
  13. Chaczko, Z., Klempous, R., Nikodem, J., and Rozenblit, J. 2006. 24/7 Software development in virtual student exchange groups: Redefining the work and study week. ITHET 7th Annual International Conference. Sydney, Australia.Google ScholarGoogle Scholar
  14. Denny, N. 2006. The nexus of entrepreneurship and technology (NEXT) initiative tech. Rep. # 20060810, Eller College of Management, University of Arizona.Google ScholarGoogle Scholar
  15. Diffie, W. and Hellman, M. E. 1976. New Directions in Cryptography. IEEE Trans. Info. Theorm, 644--654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Evaristo, R. J. and Scudder, R. 2000. Distributed project teams: A dimensional analysis. In Proceedings of the 33rd Hawaii International Conference on System Sciences. Geographically, 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Fertig, S., Freeman, E., and Gelernter, D. 1996. Lifestreams: an alternative to desktop metaphor. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 410--411. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Funk, J. L. 1997. Concurrent engineering and the underlying structure of the design problem. IEEE Trans. Engin. Manage. 44, 3, 305--315.Google ScholarGoogle ScholarCross RefCross Ref
  19. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., and Berners-Lee, T. 1997. Hypertext Transfer Protocol---HTTP1.1. RFC 2068, Internet Engineering Task Force. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Gao, J. Z., Chen, C., Toyoshimo, Y., and Leung, D. K. 1999. Engineering on the Internet for global software production. IEEE Comput. 33, 10, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Grune, D. 1986. Concurrent versions system, a method for independent cooperation. The Netherlands. Tech. Rep. IR 113. Vrije Universiteit. Amsterdam, 9.Google ScholarGoogle Scholar
  22. Gupta, A. 2001. A four-faceted knowledge based approach to surmounting national and other borders. J. Knowl. Manag. 5, 4.Google ScholarGoogle ScholarCross RefCross Ref
  23. Gupta, A., Denny, N., and Seshasai-Eds, S. 2007. Special issue on offshoring and outsourcing. J Electr. Commer. Organiz. 5, 2.Google ScholarGoogle ScholarCross RefCross Ref
  24. Hickman, K. 1995. The SSL Protocol. Netscape Communications Corp.Google ScholarGoogle Scholar
  25. Hill, C., Yates, R., Jones, C., and Kogan, S. 2006. Beyond predictable workflows: Enhancing productivity in artful business processes. IBM Syst. J. 45, (4). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Humphrey, W. S. 1995. Introducing the personal software process. Ann. Softw. Engin. 1.Google ScholarGoogle Scholar
  27. Kaptelinin. 2003. UMEA: Translating interaction histories into project contents. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 353--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Keller, K. R., Schauer, R., Robitaille, S., and Page, P. 1999. Pattern-based reverse-engineering of design components. In Proceedings of the IEEE 21st International Conference on Software Engineering. 226--235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Klensin, J. 2001. Simple mail transfer protocol. RFC 2821. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Lacity, M., Willcocks, D., and Feeny, D. 1995. IT outsourcing: maximize flexibility and control. Harv. Busi. Rev. 84--93.Google ScholarGoogle Scholar
  31. Lei, D. and Slocum, J. 1992. Global strategy, competence building and strategic alliances. CA. Manage. Rev. 81--97.Google ScholarGoogle Scholar
  32. MacCormack, A., Newman, L., and Rosenfeld, D. 1994. The new dynamics of global manufacturing site location. Sloan Manag. Rev. 69--80.Google ScholarGoogle Scholar
  33. Mitra, A. and Gupta, A. 2006. Agile Systems with Reusable Patterns of Business Knowledge a Component Based Approach. Artech House Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Myers, J. and Rose, M. 1996. Post Office Protocol---Version 3, STD 53, RFC 1939. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. National Institute of Science and Technology. FIPS PUB 180-2, 2002. Secure Hash Standard (SHS).Google ScholarGoogle Scholar
  36. National Institute of Science and Technology. FIPS PUB 197, 2001. Advanced Encryption Standard (AES).Google ScholarGoogle Scholar
  37. National Institute of Standards and Technology. FIPS PUBS 46-3, 1999. Data encryption standard (DES).Google ScholarGoogle Scholar
  38. Orlikowski, W. and Yates, J. 2002. It's about time: temporal structuring in organizations. Organiz. Sci. 13, 6. 684--700. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Pena-Mora, F., Sriram, R., and Logcher, R. 1995. Conflict mitigation system for collaborative engineering. In Artificial Intelligence in Engineering Design, Analysis and Manufacturing. 101--124.Google ScholarGoogle Scholar
  40. Pisano, G. and Wheelwright, S. 1995. The new logic of high tech R&D. Harv. Bus. Rev. 93--105.Google ScholarGoogle Scholar
  41. Powell, W. 1998. Learning from collaboration: Knowledge and networks in the biotechnology and pharmaceutical industries. CA. Manag. Rev., 228--240.Google ScholarGoogle Scholar
  42. QuestMap 2000 v3.12 The Soft Bicycle Company.Google ScholarGoogle Scholar
  43. Quinn, J. 1999. Strategic outsourcing---leveraging knowledge capabilities. Sloan Manag. Rev.Google ScholarGoogle Scholar
  44. Rekimoto, J. 1999. TimeScape: A time machine for desktop environment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 45--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Sambamurthy, V., Bharadwhaj, A., and Grover, V. 2003. Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms. MIS Quar. 27, 2, 237--263.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Seitz, M. and Peattie, K. 2004. Meeting the closed-loop challenge. CA. Manag. Rev. 74--89.Google ScholarGoogle Scholar
  47. Seshasai, S. and Gupta, A. 2004. A knowledge-based approach to engineering design. AIAA J. Spacecrafts Rockets, 41, 1.Google ScholarGoogle Scholar
  48. Stallings, W. 2000. Cryptography and Network Security: Principles and Practice, 4th Ed. (Chapters 1 to 13, and 16). Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Seshu, R. and Denny, N. 2007. The nexus of entrepreneurship and technology (NEXT) initiative tech. rep. # 20070220, Eller College of Management, University of Arizona.Google ScholarGoogle Scholar
  50. Schwaber, K. and Beedle, M. 2002. Agile Software Development with Scrum. (Series in agile software development.) Upper Saddle: Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Sriram, D., Logcher, R. D., Groleau, N., and Cherneff, J. 1992. DICE: Object oriented programming environment for cooperative engineering design. In Artificial Intelligence in Engineering Design (Vol. III): Knowledge Acquisition, Commercial Systems, and Integrated Environments. Academic Press, San Diego, CA. 303--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Tan, G., Hayes, C., and Shaw, M. 1991. An Intelligent agent framework for concurrent product design and planning. IEEE Trans. Engin. Manag. 43, 3.Google ScholarGoogle Scholar
  53. Tridgell, A. 2000. The RSYNC algorithm. Ottawa Linux Symposium, Canada.Google ScholarGoogle Scholar
  54. Wharton. 2005. How some BPO providers seek to build and protect their turf. knowledge. Wharton Research Report.Google ScholarGoogle Scholar
  55. Wharton. 2006. Realizing the Indian dream. 11th Wharton India Economic Forum.Google ScholarGoogle Scholar
  56. Whitehead, E. J. 1997. World Wide Web distributed authoring and versioning (WebDAV): An introduction. StandardView 5, 1, 3--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Wu, J., Doong, H., Lee, C., Hisa, T., and Liang, T. 2004. A methodology for designing form-based decision support systems. Decis. Supp. Syst. 36, 3, 313--335. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Yap, M. 2005. Follow the sun: Distributed extreme programming development. Agile Development Conference (ADC'05). 218--224. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. 24-hour knowledge factory: Using Internet technology to leverage spatial and temporal separations

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!